Skip to content

glestel/minion-http-code-checker-plugin

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 

Repository files navigation

minion-http-code-checker-plugin

A plugin that check the http code of a target for Minion

Installation

It assumes that you already have Minion installed (https://github.com/mozilla/minion)

  • Clone the project with git clone https://github.com/glestel/minion-http-code-checker-plugin.git
  • If needed load the virtualenv with source {minion-directory}/minion/env/bin/activate
  • Then run in the minion-http-code-checker-plugin directory : python setup.py develop

Example of plan

[
  {
    "configuration": {
      "report_dir": "/tmp/artifacts/",
      "expected_code": 403,
      "user-agent": "WordPress/2.1.1",
      "groups_targets": [
        "Target_Public"
      ],
    },
    "description": "Used to check the http response of a target",
    "plugin_name": "minion.plugins.http_code_checker.HTTPCodeCheckerPlugin"
  }
]

The list of available options are :

  • report_dir : directory were the logging file will be written. Default is /tmp/artifacts
  • expected_code : HTTP code expected when the GET request will be made against the target. Default is 200
  • user-agent : user agent used with the request
  • groups_targets : the plugin will use as target for audit every target listed within each Minion's groups
  • include_calling_target : the target used on Minion to launch the script will not be added to the target list. Default is false
  • store_success : every target responding successfully will be added to an Info issue. Default is false
  • enforce_ssl : skip ssl verification when making request. Default is true

About

A plugin that check the http code of a target for Minion

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages